What do Cybersecurity and Fashion have in common?

Share

Categories

Tags

Every year Paris, Milan and New York show the latest from the world’s leading fashion designers.

Some people ignore fashion, buying quality investment pieces, and others won’t shop outside a discount store, then there are the guys who exclusively wear free vendor t-shirts! Others are on the cutting edge, wearing the latest Gucci florals, Nike by Riccardo Tisci, or “inspired designs” from Zara. Some of the cutting edge purchases will see a number of seasons until they are retired to the recycle bin and superseded by newer models.

And so to cybersecurity, there are fashions and trends with buyers and products in CyberSecurity, many of which are led by the threats at hand and the developers response to these threats. The market has vendors with long pedigrees refreshing their offerings to add new value, through to noisy upstarts trying to bust the status quo. Each comes with its own strengths and weaknesses.

There is a category of buyer that I’d call the Wardrobe Refresh. Vulnerability management is in this category in 2018. Most companies have at minimum a vulnerability assessment tool that is like a reliable old jumper – it’s a bit too tight, it’s comfortable, it could look better, but they have gotten used to it, and it would be expensive to replace. On the other hand, many companies have a years old vulnerability management solution that, back in the day, was a cashmere jumper in the latest shade, but today is a little off colour, has a quite few holes and isn’t delivering the warmth that is needed.

The renewed interest in vulnerability management solutions is driven by three factors. McAfee Foundstone was a definite market leader back in the day, but is now end of life. In the past customers who required an enterprise-grade SAAS option had very few choices so have stayed with a vendor based on a delivery mechanism rather than functionality. Customers are finding point and shoot vulnerability assessment tools just aren’t getting the results they need fast enough.

In 2018, Aquion is working closely with Rapid7 to meet the market’s vulnerability management Wardrobe Refresh whether on premise or in the cloud.
There are four essential components in an effective VM program:

1. Investigate: Defining, identifying and scoping the environment
2. Scan: The act of scanning the network (which is the easy part), with the correct access/credentials
3. Remediate: Prioritize and assign vulnerabilities for remediation based on criticality
4. Reporte: Finally, you need to know how you’re doing to improve the effectiveness of your VM program. You can do this by establishing a baseline, setting metrics for success, and tracking

Whether you are looking at tightening patching regimes or integrating the findings of a vulnerability management solution with other complex security technologies, Aquion believes that Rapid7 has the most flexible and scalable solution to meet your needs.